Testing Active Directory Settings Using RACADM

To test the Active Directory settings, use the testfeature command. For more information, see the
iDRAC8 RACADM Command Line Interface Reference Guide available at dell.com/support/manuals.
Configuring Generic LDAP Users
iDRAC provides a generic solution to support Lightweight Directory Access Protocol (LDAP)-based
authentication. This feature does not require any schema extension on your directory services.
To make iDRAC LDAP implementation generic, the commonality between different directory services is
utilized to group users and then map the user-group relationship. The directory service specific action is
the schema. For example, they may have different attribute names for the group, user, and the link
between the user and the group. These actions can be configured in iDRAC.
NOTE: The Smart Card based Two Factor Authentication (TFA) and the Single Sign-On (SSO) logins
are not supported for generic LDAP Directory Service.
Related Links
Configuring Generic LDAP Directory Service Using iDRAC Web-Based Interface
Configuring Generic LDAP Directory Service Using RACADM

Configuring Generic LDAP Directory Service Using iDRAC Web-Based

Interface

To configure the generic LDAP directory service using Web interface:
NOTE: For information about the various fields, see the iDRAC Online Help.
1. In the iDRAC Web interface, go to OverviewiDRAC SettingsUser AuthenticationDirectory
ServicesGeneric LDAP Directory Service.
The Generic LDAP Configuration and Management page displays the current generic LDAP settings.
2. Click Configure Generic LDAP.
3. Optionally, enable certificate validation and upload the digital certificate used during initiation of SSL
connections when communicating with a generic LDAP server.
NOTE: In this release, non-SSL port based LDAP bind is not supported. Only LDAP over SSL is
supported.
4. Click Next.
The Generic LDAP Configuration and Management Step 2 of 3 page is displayed.
5. Enable generic LDAP authentication and specify the location information about generic LDAP servers
and user accounts.
NOTE: If certificate validation is enabled, specify the LDAP Server’s FQDN and make sure that
DNS is configured correctly under OverviewiDRAC SettingsNetwork.
NOTE: In this release, nested group is not supported. The firmware searches for the direct
member of the group to match the user DN. Also, only single domain is supported. Cross
domain is not supported.
6. Click Next.
The Generic LDAP Configuration and Management Step 3a of 3 page is displayed.
162